As if this would come as a surprise to anyone with two brain cells to rub together, the NY Times has this quote from Tim O'Reilly: "Microsoft is totally off the radar of the cool, hip, cutting-edge software developers."
That's right, iTunes has been fully hacked, and your account is quite possibly up for grabs, as are the details of your personal information and your credit cards. Wasn't the whole "We're-Apple-and-we-control-what-gets-into-the-App-Store" thing supposed to prevent this exact scenario? But it's worse than that.
YouTube users got a special treat on July 4th- a large-scale attack was done against thousands of pages on the site using a simple HTML injection vulnerability in the comment system. The attack caused effects such as blacked out pages with enormous text scrolling across them, blanked out pages, and lots of redirects to "shock site" (which we're not Not NOT going to detail here, but suffice it to say that some of the sites users got sent to were pretty awful).
An interesting tidbit from an article on eWeek, which bills itself as the magazine for "Enterprise Technology News and Reviews". In the article, reviewer P. J. Connolly covers the new version of the Safari browser, and gushes about its ability to upgrade itself without crashing. But the part that caught my eye was where she talked about her personal browsing habits, and remarked, "I wouldn't use tabbed browsing unless my life (or my paycheck) depended on it."
Leave it to Microsoft to keep innovating in the dark as if their development labs were built from left-over bits of Rupe Goldberg's yard sale. Microsoft has an unparalleled knack for bringing out new products that underperfom in every meaningful way, and which then promptly sink like a rock. The latest stillborn creation is the "Kin". Never heard of it? Of course you haven't. And you never will.
As if I needed one, here's another reason I'll never buy an iPad or iPhone. The new updated iTunes terms of service give Apple the absolute right and power to collect and share your "precise, real-time location".
Like, there's no way this could ever be abused, right? Not by stalkers or marketers or the government, oh no. Never. C'mon, we're Apple, trust us.
That's right, he new version of iTunes showing up on your computer right about now has new, non-negotiable terms of service. If you install it, you "agree" to allow Apple to collect precise information about your location in real time and use it, sell it, or give it away. Apple promises that its location data is "collected anonymously in a form that does not personally identify you." Of course, AOL thought that the search data it released was anonymous and didn't personally identify people, and (GASP!) it turns out they they were wrong.
Here's the relevant excerpt:
"To provide location-based services on Apple products, Apple and our partners and licensees may collect, use, and share precise location data, including the real-time geographic location of your Apple computer or device. This location data is collected anonymously in a form that does not personally identify you and is used by Apple and our partners and licensees to provide and improve location-based products and services. For example, we may share geographic location with application providers when you opt in to their location services.
Some location-based services offered by Apple, such as the MobileMe “Find My iPhone” feature, require your personal information for the feature to work."
The scammers and phishers have outsone themselves with an extremely credible phishing email that appears to come from GoDaddy. It's a work of art- no misspelled words, images drawn directly from GoDaddy's servers, a believable "From:" address, and none of the obvious hallmarks of your typical phishing email. And it's fooled quite a few people who have an account with GoDaddy so far.
If you have a website, it's being attacked, probably on a daily basis. Looking at your server logs will almost undoubtedly show you many, many attempts at gaining entry by password-guessing bots or by repeated attempts to exploit your web forms. Expect that every form you use will be attacked mindlessly over and over by bots. It's just the way it is these days. Plan for it and guard against it. In this article I'll give you some basic tools and techniques to help make sure that you stay in control of your server or web site.
- Linux usage among developers is on the rise, at the expense of Windows
- MySQL has pulled ahead of Oracle, by a factor of 3-to-2, as the database of choice among Eclipse developers.
- Enterprise JavaBeans and Spring usage are in a dead heat
MySQL database usage has grown 27.7 percent in 2009 to 31.8 percent in 2010. At the same time, usage of Oracle's database fell from 27.3 percent in 2009 to 21.8 percent in 2010.
'The data demonstrate that fears surrounding Oracle's control over MySQL have not resulted in lower use of MySQL in favor of an alternative open source database,' Rodrigues writes.
Usage of Windows by developers declined from 64.3 percent in 2009 to 58.3 percent in 2010. The decline of Windows is mirrored by a nearly equivalent growth in Linux usage on developer desktops.
There's a massive attack currently taking place that's targeting servers running Microsoft's IIS. The attack results in infecting the sites with a malicious script, and has already compromised "tens of thousands" of sites already, according to an article on threatpost.com. The attack was first noticed earlier this week and has affected a number of high-profile sites, including those belonging to The Wall Street Journal, The Jerusalem Post, and the ServiceWomen.org site.